The “Wizzards” of Adware
By Talos Group Talos posted a blog, September 2015, which aimed to identify how often seemingly benign software can be rightly condemned for being a piece of malware. With this in mind, this blog presents an interesting piece of “software” which we felt deserved additional information disclosure. This software exhibits several questionable behaviors including: Attempts […]
The “Wizzards” of Adware
By Talos Group Talos posted a blog, September 2015, which aimed to identify how often seemingly benign software can be rightly condemned for being a piece of malware. With this in mind, this blog presents an interesting piece of “software” which we felt deserved additional information disclosure. This software exhibits several questionable behaviors including: Attempts […]
Vulnerability Spotlight: Further NTPD Vulnerabilities
By Talos Group As a member of the Linux Foundation Core Infrastructure Initiative, Cisco is contributing to the CII effort by evaluating the Network Time Protocol daemon (ntpd) for security defects. We previously identified a series of vulnerabilities in the Network Time Protocol daemon; through our continued research we have identified further vulnerabilities in the […]
Vulnerability Spotlight: Further NTPD Vulnerabilities
By Talos Group As a member of the Linux Foundation Core Infrastructure Initiative, Cisco is contributing to the CII effort by evaluating the Network Time Protocol daemon (ntpd) for security defects. We previously identified a series of vulnerabilities in the Network Time Protocol daemon; through our continued research we have identified further vulnerabilities in the […]
Fortinet Reports First Quarter 2016 Financial Results
Fortinet Reports First Quarter 2016 Financial Results Source:: Fortinet
Fortinet Reports First Quarter 2016 Financial Results
Fortinet Reports First Quarter 2016 Financial Results Source:: Fortinet
The Service Provider Security Question
By Scott Harrell I talk to a lot of customers and partners in the Service Provider space, and among the many conversations, I notice a common set of concerns centered around a simple question: have we done all that we can to secure both our own infrastructure and that of our customers? Simple enough question, […]